


default search action
5th MALWARE 2010: Nancy, France
- 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, October 19-20, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-9355-5

- Giorgos Vasiliadis

, Michalis Polychronakis, Sotiris Ioannidis:
GPU-assisted malware. 1-6 - Fernand Lone Sang, Éric Lacombe, Vincent Nicomette, Yves Deswarte

:
Exploiting an I/OMMU vulnerability. 7-14 - Andrew Walenstein, Daniel J. Hefner, Jeffery Wichers:

Header information in malware families and impact on automated classifiers. 15-22 - Ronghua Tian, Md. Rafiqul Islam, Lynn Margaret Batten, Steven Versteeg:

Differentiating malware from cleanware using behavioural analysis. 23-30 - Jose Andre Morales

, Ravi S. Sandhu, Shouhuai Xu:
Evaluating detection and treatment effectiveness of commercial anti-malware programs. 31-38 - Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh:

Memory behavior-based automatic malware unpacking in stealth debugging environment. 39-46 - Isabelle Gnaedig, Matthieu Kaczmarek, Daniel Reynaud, Stéphane Wloka:

Unconditional self-modifying code elimination with dynamic compiler optimizations. 47-54 - Thomas Bläsing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Çamtepe

, Sahin Albayrak
:
An Android Application Sandbox system for suspicious software detection. 55-62 - Kurt Thomas, David M. Nicol:

The Koobface botnet and the rise of social malware. 63-70 - Collin Mulliner, Jean-Pierre Seifert:

Rise of the iBots: Owning a telco network. 71-80 - Fernando C. Colón Osorio, Frank S. Posluszny:

Overcoming the limitations in computer worm models. 81-90 - Marco Ramilli, Matt Bishop

:
Multi-stage delivery of malware. 91-97 - Guhyeon Jeong, Euijin Choo, Joosuk Lee, Munkhbayar Bat-Erdene, Heejo Lee:

Generic unpacking using entropy analysis. 98-105 - Rodrigo Rubira Branco, Udi Shamir:

Architecture for automation of malware analysis. 106-112 - Shanhu Shang, Ning Zheng, Jian Xu, Ming Xu, Haiping Zhang:

Detecting malware variants via function-call graph similarity. 113-120

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














